recommended reading

Most Federal National Security IT Considered ‘Essential,’ Industry Official Says

A reflection of the Department of Homeland Security logo is seen reflected in the glasses of a cyber security analyst.

A reflection of the Department of Homeland Security logo is seen reflected in the glasses of a cyber security analyst. // Mark J. Terrill/AP File Photo

Information technology programs that support national security, homeland security and law enforcement will be deemed essential during the government shutdown, a top executive of an industry trade group predicted.

Even with a shutdown, the government needs to protect and operate its networks, and federal workers who maintain those systems will stay on their jobs, said Trey Hodgkins, TechAmerica’s senior vice president of global public policy. 

Cybersecurity is essential to multiple agencies, and cyber operations will continue during the shutdown, he said. Law enforcement organizations, such as the FBI’s Criminal Justice Information Services Division, which among other things performs fingerprint matches for local police departments, should also be viewed as essential, Hodgkins said.

“I would be surprised if that was shuttered,” Hodkins said.  The Criminal Justice Information Services website was operating Tuesday, with no shutdown notice posted.

Deniece Peterson, director of federal industry analysis at a consulting firm GovWin, said public health, Federal Aviation Administration air traffic control and parts of the banking system would be considered essential government functions, with IT personnel supporting those functions viewed as essential.

Whether IT personnel are deemed essential would likely have to be determined on a case-by-case basis, rather than at the agency or project level. Even if civilian or contract employees are deemed essential and continue to work during a shutdown, they face the prospect of not getting paid until the government opens up for business again, Peterson said.

Routine tasks, such as issuing a new laptop, may have to wait until the shutdown ends, Hodgkins said.

Contractors performing essential IT tasks will eventually get paid for their work during the shutdown, though it may take a while, as some federal employees who handle invoices, approve payments and write checks will be deemed nonessential.

Slow payments could lead to cash flow problems for large and small contractors, with cash problems hitting smaller firms earlier than large firms, he said. Cash shortages could hit small firms in less than two weeks.

Hodgkins predicted the government would be back in operation by next Monday.  

Shawn Osborne, president and CEO of TechAmerica, said in a statement that even a short shutdown has long term ramifications. “The constant cycle of continuing resolutions and constant brinkmanship with our government can’t continue,” he said. “Anyone who does any business with the government is constantly living on uncertain footing, completely preventing them from doing any long-term planning or investments. Congress and the president need to understand that even after they come to a deal, the hangover of a shutdown is long and painful.”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.